An Investigation on Feasibility and Security for Cyberattacks on Generator Synchronization Process

被引:16
作者
Kandasamy, Nandha Kumar [1 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Generators; Synchronization; Power system stability; Power supplies; Malware; Security; Magnetosphere; Generator cyberattacks; malware-based attacks; physical layer security (PLS); power distribution systems (PDSs); synchronization process; PROTECTION;
D O I
10.1109/TII.2019.2957828
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electric power supply is crucial for the effective operation of many sectors such as manufacturing, health care, etc. Further, electrification of the transportation network including metro-rail systems and personal electric vehicles necessitates capacity expansion of power distribution system (PDS). Capacity expansion in PDSs is seeing a clear paradigm shift from component upgrades to the incorporation of distributed energy resources. Though renewable energy sources are attractive from the sustainability aspect, conventional generators are also essential for many applications such as maintaining the grid stability. In this article, for the first time, we report a new type of attack on the generators; attacks on the synchronization process, targeting the availability of generators. The threat model considered in this article is similar to the popular real-world attacks, such as "Stuxnet worm" or programmable logic controller root-kit attacks such as "Harvey," however, the reported attack goal is novel. We propose a defense mechanism that can be decoupled from the network data and is named as physical layer security (PLS). We present theoretical analysis, simulation results, and experimental validation for the reported attack. We also propose an alternative implementation named as Level 0-1 security for cases where PLS may not be practical. The proposed defense is generic and can be extended to many other applications/attack vectors.
引用
收藏
页码:5825 / 5834
页数:10
相关论文
共 38 条
  • [11] Cherepanov A., 2017, WELIVESECURITY BLOG
  • [12] Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
    Das, Sanjeev
    Liu, Yang
    Zhang, Wei
    Chandramohan, Mahintham
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 289 - 302
  • [13] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651
  • [14] Smart Grid Overview: Infrastructure, Cyber Physical Security and Challenges
    Dumitrache, Ioan
    Dogaru, Delia Ioana
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 693 - 699
  • [15] Emergency department visits for home medical device failure during the 2003 North America blackout
    Greenwald, PW
    Rutherford, AF
    Green, RA
    Giglio, J
    [J]. ACADEMIC EMERGENCY MEDICINE, 2004, 11 (07) : 786 - 789
  • [16] Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations
    Hong, Junho
    Nuqui, Reynaldo F.
    Kondabathini, Anil
    Ishchenko, Dmitry
    Martin, Aaron
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (07) : 4332 - 4341
  • [17] Hu XS, 2017, IEEE POWER ENERGY M, V15, P20, DOI 10.1109/MPE.2017.2708812
  • [18] Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
    Islam, Mohammad A.
    Ren, Shaolei
    Wierman, Adam
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1079 - 1094
  • [19] Cybersecurity for distributed energy resources and smart invertersInspec keywordsOther keywords
    Qi, Junjian
    Hahn, Adam
    Lu, Xiaonan
    Wang, Jianhui
    Liu, Chen-Ching
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) : 28 - 39
  • [20] Lee A., 2013, ELECT SECTOR FAILURE, V1